Traditional Culture Encyclopedia - Traditional stories - The difference between waterproof wall and firewall
The difference between waterproof wall and firewall
In other words, I think the waterproof wall in Li Shan is good and fully functional.
File security needs to be guaranteed from the following aspects:
Strong confidentiality: prevent unauthorized users from obtaining file contents, and prevent confidential files from being leaked due to the loss of storage devices.
Tamper-proof: Prevent unauthorized users from tampering with document contents.
Availability: Ensure that authorized users can use confidential data, including employees in the company network, employees on business trips, customers and partners.
Leak prevention: prevent authorized users from sending documents or document contents to others through copying, mobile storage, network transmission, printing, etc. After obtaining the file, it leads to the spread of confidential data.
Anti-recovery: prevent data carriers such as hard disks from being turned into security nightmares by people with ulterior motives using various recovery tools when they are out of the sight of managers for maintenance.
The direct purpose of document security is to ensure the security of documents, to ensure that confidential data can only be used in a safe environment, and to control the use of confidential data even outside a specific network environment. But don't affect the processing efficiency of the document itself too much, and change the use process of the document.
Li Shan waterproof wall information security management system (data leakage prevention system) has dual management objects:
1, the object of management is the computer itself first. For example, manage the IT assets of computers, manage the ports and media of computers, and manage the use of computer programs.
2. The managed objects also need to be documents with various security levels existing on the computer. These documents are the real source of wealth. One of the goals of management is not to prevent leaks.
Around the world, various countries have introduced various laws to control information auditing, among which SOX Act in the United States and cryptogram in Japan are the representatives. The China Municipal Government has formulated a series of laws and regulations, such as Basic Standards for Enterprise Internal Control, Grade Protection and Grade Protection, to evaluate and manage the information security of different types of organizations, and the comprehensive information security popularization work is being vigorously promoted in China.
Li Shan Waterproof Wall Information Security Management System is a set of products supported by Innovation Fund of Ministry of Industry and Information Technology. This product has 7 patents and passed 6 qualification certifications. It is a valuable data leakage prevention and terminal management product. Technically, this product occupies the commanding height and has a great lead.
Li Shan waterproof wall has a set of data lifecycle management (DLM) model through data author management, colleague management, partner management, user management and destruction management. After the software is implemented, the technical essence of anti-leakage can be realized.
Li Shan waterproof wall adopts a set of computer terminal management mode, including equipment asset management, port management, media management, outreach management, desktop management and remote management. After the software is implemented, it can achieve the management effect of technical means.
For a protected computer, you can do the following:
Peripheral management: forbidden, read-only or audit;
Illegal outreach: multi-port, multi-device and recorded;
Transparent encryption: stolen, taken away, unable to use;
Permission control: who can read and print, tamper-proof;
Time limit: frequency, time and strict limit;
Use tracking: who has seen it, who has printed it, and has records;
Life cycle: who produces, who enjoys and who destroys;
Log audit: Who sets it, who uses it and who audits it.
As a software R&D enterprise that has passed the three-level evaluation of SEI software capability maturity CMMI3, Li Shan Company is also a national double soft certification enterprise. The company has set up marketing agencies in Beijing, Shanghai and Guangzhou, R&D agencies in Shanghai, Xi and Chengdu, and product after-sales service technical support centers (ASC) in Shenzhen, Fuzhou, Wuhan, Changsha, Nanjing, Hangzhou, Jinan, Shenyang, Zhengzhou, Changchun and Harbin. Through the combination of CMMI3 software capability maturity management model and PMI project model, the management mode of project director (manager) and implementation director (manager) is adopted to provide customers with professional services for 7*24 hours by means of on-site personnel, 800 telephone calls, 800 messages and email communication.
- Related articles
- How to play the power grid power plant? Better have pictures.
- Key points of pharmacognosy research
- Fish Imagination Drawing Illustration Pictures - How to Draw Fish Sketches
- Qing Dynasty furniture style characteristics in detail
- What is Lvliang colored sarin famous for?
- What are the common international logistics freight requirements?
- How to set windows7 to log on to the computer directly without selecting the user to log on?
- What are the types of printing processes
- How much is the house price of Shantou Yunxi Garden?
- Regarding the practice of river snails, which is simple, easy to make, delicious and particularly convenient?